In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?

IT Questions BankCategory: CyberOps AssociateIn which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?

In which step does the threat actor use vulnerabilities of the assets that were discovered and builds them into a tool?

  • exploitation
  • delivery
  • reconnaissance
  • command and control
  • weaponization

Explanation: In the weaponization stage, the threat actor uses vulnerabilities of the assets and builds a tool to exploit them.

Exam with this question: 28.2.9 Check Your Understanding - Identify the Kill Chain Step

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments